Logservice


margo@caption:~$ ps -auxww | grep -i server.go
root        1050  0.0  0.0   2892   956 ?        Ss   08:12   0:00 /bin/sh -c cd /root;/usr/local/go/bin/go run server.go
root        1051  0.0  0.4 1240804 17632 ?       Sl   08:12   0:01 /usr/local/go/bin/go run server.go

It would appear that the Logservice that was seen in the GitBucket repository is running in the target system with the privileges of the root user

Checking the source code of the server application reveals a critical vulnerability

The logs variable is directly passed on to the exec.Command function without any input sanitization

This would mean that code execution is achievable if i could control the logs variable. such as the userAgent variable

The server application is running on the target port 9090

Moving on to the Privilege Escalation phase